Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
bcca5060b97d4b003bd960ca7afa9600N.exe
Resource
win7-20240708-en
General
-
Target
bcca5060b97d4b003bd960ca7afa9600N.exe
-
Size
897KB
-
MD5
bcca5060b97d4b003bd960ca7afa9600
-
SHA1
c98d164bc3b564f53cbc9ec55c9ca62eb5305d73
-
SHA256
b40c65c49b987514cf7edf1287b5562d9dee506835e7208302bfecf71edd44c1
-
SHA512
8044a79937145b7f87ecbbb9fe487ce2e320bf445545e32bc425e9530dcebc3fcead1b12a32212ed6727b15f78b36d84124332593d7f0a9a6a880a72e1774186
-
SSDEEP
24576:7PT80SR76+GxaDhSDdrdpgukMjK/k//Ml:M0SROiSDNgurK3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bcca5060b97d4b003bd960ca7afa9600N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 bcca5060b97d4b003bd960ca7afa9600N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN bcca5060b97d4b003bd960ca7afa9600N.exe File opened (read-only) \??\VBoxMiniRdrDN Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcca5060b97d4b003bd960ca7afa9600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30 PID 2212 wrote to memory of 2844 2212 bcca5060b97d4b003bd960ca7afa9600N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcca5060b97d4b003bd960ca7afa9600N.exe"C:\Users\Admin\AppData\Local\Temp\bcca5060b97d4b003bd960ca7afa9600N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\a2GJIcp0k1\Idd0xp75\Setup.exe"C:\Users\Admin\AppData\Local\Temp\a2GJIcp0k1\Idd0xp75\Setup.exe" --relaunch2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897KB
MD5bcca5060b97d4b003bd960ca7afa9600
SHA1c98d164bc3b564f53cbc9ec55c9ca62eb5305d73
SHA256b40c65c49b987514cf7edf1287b5562d9dee506835e7208302bfecf71edd44c1
SHA5128044a79937145b7f87ecbbb9fe487ce2e320bf445545e32bc425e9530dcebc3fcead1b12a32212ed6727b15f78b36d84124332593d7f0a9a6a880a72e1774186